نتایج جستجو برای: food fraud

تعداد نتایج: 278983  

2014
Twinkle Patel

As the usage of credit card has increased the credit card fraud has also increased dramatically. Existing fraud detection techniques are not capable to detect fraud at the time when transaction is in progress. Improvement in existing fraud detection is necessary. In this paper Hidden Markov model is used to detect the fraud when transaction is in progress. Here is shown that hidden markov model...

2012
Aanjhan Ranganathan Nils Ole Tippenhauer Boris Skoric Dave Singelée Srdjan Capkun

Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few designs have been proposed and implemented. Currently, the most efficient implementation of distance bounding protocols uses analog processing and enables the prover to receive a message, process it and transmit the reply within 1 ns...

Journal: :Expert Syst. Appl. 2013
Yusuf Sahin Serol Bulkan Ekrem Duman

With the developments in the information technology, fraud is spreading all over the world, resulting in huge financial losses. Though fraud prevention mechanisms such as CHIP&PIN are developed for credit card systems, these mechanisms do not prevent the most common fraud types such as fraudulent credit card usages over virtual POS (Point Of Sale) terminals or mail orders so called online credi...

2003
Jiwei Wang K. A. Farrell K.A R. Parrino

Fraud scandals can create incentives to change managers in an attempt to improve the firm’s performance, recover lost reputational capital, or limit the firm’s exposure to liabilities that arise from the fraud. It also is possible that the revelation of fraud creates incentives to change the composition of the firm’s board, to improve the external monitoring of managers, or to rent new director...

2007
Jose R Hernandez Tom Groot

This study investigates the nature and extent to which managerial attitudes influence fraud risk perceptions, observations and experiences of audit partners. Using a sample of 5,603 client acceptance and audit continuance assessments at a Big Four audit firm in the Netherlands, this study finds that: (1) manager integrity, honesty, and ethics are considered by audit partners to be of highest im...

2013

A fraud survey found that 75 percent of the 459 responding organizations experienced some form of fraud during the prior 12 month period [1]. The Association of Certified Fraud Examiners (ACFE) estimates 6 percent of revenues are lost due to theft by employees and that small businesses suffer disproportionate losses because of limited resources devoted to fraud detection [2]. Most employee thef...

Journal: :Jurnal Manajemen dan Bisnis 2022

This study aims to find out the effects of financial stability, internal control effectiveness, and auditor change on statement fraud. Where in this research population are food sub-sector manufacturing companies listed Indonesia Stock Exchange 2017-2022. The method determining sample is done by purposive sampling technique. data obtained for 21 from 2017 2020 was associated with 4 variables, n...

1998
Douglas T. Heitkemper Lisa A. Kaine David S. Jackson Karen A. Wolnik

The Food and Drug Administration is responsible for regulating the use of polyphosphates in seafood. Sodium tripolyphosphate is the most commonly used polyphosphate in the processed shrimp industry; and current regulations limit its use in accordance with Good Manufacturing Practice. The potential exists for economic fraud through mislabeling or excessive use of tripolyphosphate. At this point;...

2014
Carmen Arguedas Esther Blanco

We analyze the strategic decision of firms to voluntarily certify corporate social responsibility (CSR) practices in a context where other firms can falsely pretend to be socially responsible. Equilibrium outcomes are crucially determined by consumers' beliefs about the credibility of firms' CSR claims, which depend in turn on the (expected) fines for fraud. First, we show that an increase in s...

2010
A. Mitrokotsa C. Dimitrakakis P. Peris-Lopez J. C. Hernandez-Castro

Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, maa fraud and terrorist fraud attacks. Reid et al. proposed the rst symmetric key distance bounding protocol against maa and terrorist fraud attacks [1]. However, [2] claims that this is only achieved with a (7/8) probability of success for maa fraud, rather than the theoretical value...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید